default search action
Computers & Security, Volume 24
Volume 24, Number 1, February 2005
- Security views: Malware update. Comput. Secur. 24(1): 1-9 (2005)
- Theodosios Tsiakis, George Stephanides:
The concept of security and trust in electronic payments. 10-15 - Mariana Gerber, Rossouw von Solms:
Management of risk in the information age. 16-30 - Simon Hansman, Ray Hunt:
A taxonomy of network and computer attacks. 31-43 - Tianjie Cao, Dongdai Lin, Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash. 44-49 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. 50-56 - Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar:
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. 57-68 - Kerry-Lynn Thomson, Rossouw von Solms:
Information security obedience: a definition. 69-75 - Ruishan Zhang, Kefei Chen:
Improvements on the WTLS protocol to avoid denial of service attacks. 76-82 - Che Wun Chiou, Chiou-Yng Lee:
Multiplexer-based double-exponentiation for normal basis of GF(2m). 83-86
Volume 24, Number 2, March 2005
- E. Eugene Schultz:
Search engines: a growing contributor to security risk. 87-88 - E. Eugene Schultz:
Lycos crosses the line. 89-90 - Security views: Malware Update. Comput. Secur. 24(2): 91-98 (2005)
- Basie von Solms:
Information Security governance: COBIT or ISO 17799 or both? 99-104 - Theodosios Tsiakis, George Stephanides:
The economic approach of information security. 105-108 - John Marchesini, Sean W. Smith, Meiyuan Zhao:
Keyjacking: the surprising insecurity of client-side SSL. 109-123 - Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo, Jeffrey Jolton:
Analysis of end user security behaviors. 124-133 - Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalyses of two key assignment schemes based on polynomial interpolations. 134-138 - Francesco Bergadano, Davide Cavagnino:
Dealing with packet loss in the Interactive Chained Stream Authentication protocol. 139-146 - Bilge Karabacak, Ibrahim Sogukpinar:
ISRAM: information security risk analysis method. 147-159 - Han-Sung Kim, Sung Deok Cha:
Empirical evaluation of SVM-based masquerade detection using UNIX commands. 160-168 - Rui Jiang, Li Pan, Jianhua Li:
An improvement on efficient anonymous auction protocols. 169-174
Volume 24, Number 3, May 2005
- E. Eugene Schultz:
Security dilemmas with Microsoft's Internet Explorer. 175-176 - Security views - Malware update. Comput. Secur. 24(3): 177-187 (2005)
- Smart card based authentication - any future? Comput. Secur. 24(3): 188-191 (2005)
- Almut Herzog, Nahid Shahmehri:
Performance of the Java security manager. 192-207 - Faisal Nabi:
Secure business application logic for e-commerce systems. 208-217 - Xiu-Zhen Chen, Qing-Hua Zheng, Xiaohong Guan, Chen-Guang Lin, Jie Sun:
Multiple behavior information fusion based quantitative threat evaluation. 218-231 - Konstantinos Rantos, Chris J. Mitchell:
Matching key recovery mechanisms to business requirements. 232-245 - Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis:
Information systems security policies: a contextual perspective. 246-260
Volume 24, Number 4, June 2005
- E. Eugene Schultz:
Personal information compromises: It is time for the U.S. Government to wake up. 261-262 - Security views. Comput. Secur. 24(4): 263-270 (2005)
- Basie von Solms, Rossouw von Solms:
From information security to ... business security? 271-273 - Steven Furnell:
Why users cannot use security. 274-279 - David B. Chang, Carl S. Young:
Infection dynamics on the Internet. 280-286 - Wenbao Jiang, Hua Song, Yiqi Dai:
Real-time intrusion detection for high-speed networks. 287-294 - Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas:
Feature deduction and ensemble design of intrusion detection systems. 295-307 - Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
Secure information systems development - a survey and comparison. 308-321 - Giampaolo Bella, Stefano Bistarelli:
Information Assurance for security protocols. 322-333 - Sihan Qing, Weiping Wen:
A survey and trends on Internet worms. 334-346
Volume 24, Number 5, August 2005
- E. Eugene Schultz:
Non-infosec professionals in infosec? 347-348 - E. Eugene Schultz:
Security views. Comput. Secur. 24(5): 349-358 (2005) - Richard LeVine:
Technology evolution drives need for greater information technology security. 359-361 - Chris Andrew:
The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? 362-363 - Alex Biryukov, Joseph Lano, Bart Preneel:
Recent attacks on alleged SecurID and their practical implications. 364-370 - George Magklaras, Steven Furnell:
A preliminary model of end user sophistication for insider threat prediction in IT systems. 371-380 - Chou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu:
Secure authentication scheme for session initiation protocol. 381-386 - Dipankar Dasgupta, Fabio A. González, K. Yallapu, Jonatan Gómez, R. Yarramsettii:
CIDS: An agent-based intrusion detection system. 387-398 - Heba Kamal Aslan:
Two-level controllers hierarchy for a scalable and distributed multicast security protocol. 399-408 - Anat Hovav, John D'Arcy:
Capital market reaction to defective IT products: The case of computer viruses. 409-424
Volume 24, Number 6, September 2005
- E. Eugene Schultz:
The human factor in security. 425-426 - E. Eugene Schultz:
Security views. Comput. Secur. 24(6): 427-436 (2005) - C. Pollard:
Telecom fraud: The cost of doing nothing just went up. 437-439 - Steven A. Hofmeyr:
Host intrusion prevention: Part of the operating system or on top of the operating system? 440-442 - Basie von Solms:
Information Security Governance - Compliance management vs operational management. 443-447 - Terry L. Wiant:
Information security policy's impact on reporting security incidents. 448-459 - Hsien-Chu Wu, Chin-Chen Chang:
A novel digital image watermarking scheme based on the vector quantization technique. 460-471 - Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799. 472-484 - Wolfgang Fischer, Niels Lepperhoff:
Can critical infrastructures rely on the Internet? 485-491 - Philip Machanick:
A distributed systems approach to secure Internet mail. 492-499 - Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu:
Improvement on the flexible tree-based key management framework. 500-504
Volume 24, Number 7, October 2005
- E. Eugene Schultz:
Aligning disaster recovery and security incident response. 505-506 - Security views - Malware update. Comput. Secur. 24(7): 507-515 (2005)
- P. Foote, T. Neudenberger:
Beyond Sarbanes-Oxley compliance. 516-518 - Nathan L. Clarke, Steven Furnell:
Authentication of users on mobile telephones - A survey of attitudes and practices. 519-527 - Vaibhav Gowadia, Csilla Farkas, Marco Valtorta:
PAID: A Probabilistic Agent-Based Intrusion Detection system. 529-545 - Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley:
Query-directed passwords. 546-560 - H. Chris Tseng, Benjamin Jack Culpepper:
Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. 561-570 - Fu-Yuan Lee, Shiuh-Pyng Shieh:
Defending against spoofed DDoS attacks with path fingerprint. 571-586
Volume 24, Number 8, November 2005
- E. Eugene Schultz:
Infosec certification: Which way do we turn from here? 587-588 - E. Eugene Schultz:
Security views. Comput. Secur. 24(8): 589-598 (2005) - Nathan Friess, Ryan Vogt, John Aycock:
Timing is everything. 599-603 - Stephen Flowerday, Rossouw von Solms:
Real-time information integrity = system integrity + data integrity + continuous assurances. 604-613 - Haralambos Mouratidis:
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). 614-617 - Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang:
Robust remote authentication scheme with smart cards. 619-628 - Jun Jiang, Chen He, Ling-ge Jiang:
A novel mix-based location privacy mechanism in Mobile IPv6. 629-641 - Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:
SEAS, a secure e-voting protocol: Design and implementation. 642-652 - Chuan-Kun Wu:
Hash channels. 653-661 - Yun Wang:
A multinomial logistic regression modeling approach for anomaly intrusion detection. 662-674
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.